KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS
- 1. Department of Computer Science, University of Jordan, Amman, Jordan
- 2. Deanship of e-learning, University of Dammam, Ad Dammam, KSA
Description
The way that is used to achieve most important security requirements is the cryptography. Cryptography mainly depends on what is called cryptography keys; the cryptographic keys required to be managed by using a robustness technique that guarantees the needed security requirements. So first of all, the necessary keys need to be distributed to the nodes before they are disseminated in the target area, and then let the sensors that need to communicate establish its secure communication by having a deal on what is called pair-wise key, and allow the refreshment process for those keys to be occurred successfully when it is needed, and finally, having the ability to revoke the keys that related to compromised nodes. These phases are performing the process that is called Key Management. In this paper we will explain different key management schemes, critique them theoretically, and propose an idea as a way out for the expected problems in one of these schemes.
Files
6614nsa05.pdf
Files
(249.4 kB)
Name | Size | Download all |
---|---|---|
md5:772cb171c461abe05b47876ec1df0461
|
249.4 kB | Preview Download |